Effective and Privacy-Preserving Estimation of the Density Distribution of LBS Users under Geo-Indistinguishability
Abstract
:1. Introduction
1.1. Motivation
1.2. Contributions
- We developed a privacy-preserving framework for effectively computing the density distribution of LBS users based on the collection of users’ location information that has been obfuscated by the perturbation mechanism of Geo-I.
- For an accurate estimation of the density distribution of LBS users with perturbed location datasets, we explored two different approaches. The first approach leverages the functionality of the expectation-maximization (EM) algorithm to estimate the hidden information precisely (i.e., users’ true location) from observed data (i.e., users’ perturbed location). In the second approach, which is the deep learning–based approach, a generative adversarial network is first trained using the available training datasets, and then the trained generative network is used to generate the true density distribution from the perturbed location information.
- We evaluated the performance of the proposed algorithms using real and synthetic data. The evaluation results demonstrated that the proposed EM algorithm- and deep learning approaches significantly outperform the existing approaches. Furthermore, based on the evaluation results, we analyzed the features of the proposed approaches.
2. Related Work
3. Preliminary
3.1. Geo-Indistinguishability
3.2. Problem Definition
3.3. Baseline Approaches
4. Effective Privacy-Preserving Estimation of the Density Distribution of LBS Users
4.1. Expectation-Maximization Algorithm-Based Approach
4.2. Deep Learning–Based Approach
4.2.1. Training of Conditional Generative Adversarial Network
4.2.2. Estimating Density Distributions with Trained cGAN
5. Experiments
5.1. Experimental Setup
- Seoul Metro datasets [45], which correspond to real datasets, contain information on the number of passengers using each metro station each hour. For our experiments, we selected 114 stations, each of which is regarded as a grid. Then, we extracted the number of passengers using each station for each hour, which is considered as the number of LBS users in each grid. We divided the entire datasets into training and testing datasets. The training datasets, which contained 10,500 h datasets, were used for training the cGAN structure of the , as discussed in Section 4.2, whereas the testing datasets, containing the remaining 2658 h datasets, were used for evaluating the four approaches. We note that four approaches, , , , and , did not require the training datasets.
- We also synthetically generated datasets for evaluation purposes. These datasets contained 225 grids. For each grid, the number of LBS users was randomly generated under the Gaussian distribution. For our experiments, we generated 20,000 training datasets, which were used for training the cGAN structure of the , and 3000 testing datasets, which were used to evaluate the four different approaches. For each data, the Gaussian distribution with different standard deviations, randomly selected between 1.0 and 10, was used.
5.2. Results
5.3. Discussion
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Dong, Y.; Wang, S.; Li, L.; Zhang, Z. An empirical study on travel patterns of internet based ride-sharing. Transp. Res. Part C Emerg. Technol. 2018, 86, 1–22. [Google Scholar] [CrossRef]
- Liu, Y.; Kong, L.; Chen, G. Data-oriented mobile crowdsensing: A comprehensive survey. IEEE Commun. Surv. Tutor. 2019, 21, 2849–2885. [Google Scholar] [CrossRef]
- Kim, J.W.; Edemacu, K.; Jang, B. Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey. J. Netw. Comput. Appl. 2022, 200, 103315. [Google Scholar] [CrossRef]
- Chen, C.-S.; Lu, H.-P.; Luor, T. A new flow of location based service mobile games: Non-stickiness on Pokemon Go. Comput. Hum. Behav. 2018, 89, 182–190. [Google Scholar] [CrossRef]
- Bopp, E.; Douvinet, J. Spatial performance of location-based alerts in France. Int. J. Disaster Risk Reduct. 2020, 50, 101909. [Google Scholar] [CrossRef]
- Chatzikokolakis, K.; ElSalamouny, E.; Palamidessi, C. Efficient utility improvement for location privacy. In Proceedings of the Privacy Enhancing Technologies, Minneapolis, MN, USA, 18–21 July 2017; pp. 210–231. [Google Scholar]
- Kim, J.W.; Edemacu, K.; Kim, J.S.; Chung, Y.D.; Jang, B. A survey of differential privacy-based techniques and their applicability to location-Based services. Comput. Secur. 2021, 111, 102464. [Google Scholar] [CrossRef]
- Gruteser, M.O.; Grunwald, D. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the International Conference on Mobile Systems, Applications and Services, San Francisco, CA, USA, 5–8 May 2003; pp. 31–42. [Google Scholar]
- Beresford, A.R.; Stajano, F. Location privacy in pervasive computing. IEEE Pervasive Comput. 2003, 2, 46–55. [Google Scholar] [CrossRef]
- Kido, H.; Yanagisawa, Y.; Satoh, T. Protection of location privacy using dummies for location-based services. In Proceedings of the International Conference on Data Engineering Workshops, Tokyo, Japan, 5–8 April 2005. [Google Scholar]
- Mascetti, S.; Freni, D.; Bettini, C.; Wang, X.; Jajodia, S. Privacy in geo-social networks: Proximity notification with untrusted service providers and curious buddies. Int. J. Very Large Data Bases 2011, 20, 541–566. [Google Scholar] [CrossRef]
- Popa, R.A.; Blumberg, A.J.; Balakrishnan, H.; Li, F.H. Privacy and accountability for location-based aggregate statistics. In Proceedings of the ACM conference on Computer and communications security, Chicago, IL, USA, 17–21 October 2011; pp. 653–666. [Google Scholar]
- Dwork, C. Differential privacy. In Proceedings of the International Conference on Automata, Languages and Programming, Venice, Italy, 10–14 July 2006. [Google Scholar]
- Andres, M.E.; Bordenabe, N.E.; Chatzikokolakis, K.; Palamidessi, C. Geo-indistinguishability: Differential privacy for location-based systems. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Berlin, Germany, 4–8 November 2013; pp. 901–914. [Google Scholar]
- Bordenabe, N.E.; Chatzikokolakis, K.; Palamidess, C. Optimal geo-indistinguishable mechanisms for location privacy. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, 3–7 November 2014; pp. 251–262. [Google Scholar]
- Ahuja, R.; Ghinita, G.; Shahabi, C. A utility-preserving and scalable technique for protecting location data with geo-indistinguishability. In Proceedings of the International Conference on Extending Database Technology, Lisbon, Portugal, 26–29 March 2019; pp. 210–231. [Google Scholar]
- Tong, W.; Hua, J.; Zhong, S. A jointly differentially private scheduling protocol for ridesharing services. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2444–2456. [Google Scholar] [CrossRef]
- Ma, C.; Chen, C.W. Nearby friend discovery with geo-indistinguishability to stalkers. Procedia Comput. Sci. 2014, 34, 352–359. [Google Scholar] [CrossRef]
- Wang, Z.; Hu, J.; Lv, R.; Wei, J.; Wang, Q. Personalized privacy-preserving task allocation for mobile crowdsensing. IEEE Trans. Mob. Comput. 2018, 18, 1330–1341. [Google Scholar] [CrossRef]
- Qiu, C.; Squicciarini, A.C. Location privacy protection in vehicle-based spatial crowdsourcing via geo-indistinguishability. In Proceedings of the IEEE International Conference on Distributed Computing Systems, Dallas, TX, USA, 7–9 July 2019; pp. 1061–1071. [Google Scholar]
- Kim, J.S.; Kim, J.W.; Chung, Y.D. Successive point-of-interest recommendation with local differential privacy. IEEE Access 2021, 9, 66371–66386. [Google Scholar] [CrossRef]
- Feng, S.; Li, X.; Zeng, Y.; Cong, G.; Chee, Y.M. Personalized ranking metric embedding for next new poi recommendation. In Proceedings of the International Joint Conference on Artificial Intelligence, Buenos Aires, Argentina, 25–31 July 2015; pp. 2069–2075. [Google Scholar]
- Zhang, H.; Chen, Z.; Liu, Z.; Zhu, Y.; Wu, C. Location prediction based on transition probability matrices constructing from sequential rules for spatial-temporal k-Anonymity dataset. PLoS ONE 2019, 11, e0160629. [Google Scholar] [CrossRef]
- Li, M.; Zhu, L.; Zhang, Z.; Xu, R. Differentially private publication scheme for trajectory data. In Proceedings of the IEEE International Conference on Data Science in Cyberspace (DSC), Changsha, China, 13–16 June 2016. [Google Scholar]
- Li, M.; Zhu, L.; Zhang, Z.; Xu, R. Achieving differential privacy of trajectory data publishing in participatory sensing. Inf. Sci. 2017, 400–401, 1–13. [Google Scholar] [CrossRef]
- Apple Maps. Available online: https://www.apple.com/maps (accessed on 30 January 2023).
- Google Maps. Available online: https://www.google.com/maps (accessed on 30 January 2023).
- Waze. Available online: https://www.waze.com (accessed on 30 January 2023).
- Chen, R.; Li, L.; Chen, J.J.; Hou, R.; Gong, Y.; Guo, Y.; Pan, M. COVID-19 vulnerability map construction via location privacy preserving mobile crowdsourcing. In Proceedings of the IEEE Conference and Exhibition on Global Telecommunications, Taipei, Taiwan, 7–11 December 2020. [Google Scholar]
- Yan, K.; Luo, G.; Zheng, X.; Tian, L.; Sai, A.M.V.V. A comprehensive location-privacy-awareness task selection mechanism in mobile crowd-wensing. IEEE Access 2019, 7, 77541–77554. [Google Scholar] [CrossRef]
- Jin, W.; Xiao, M.; Guo, L.; Yang, L.; Li, M. ULPT: A user-centric location privacy trading framework for mobile crowd sensing. IEEE Trans. Mob. Comput. 2022, 21, 3789–3806. [Google Scholar] [CrossRef]
- Huang, C.; Lu, R.; Zhu, H.; Shao, J.; Alamer, A.; Lin, X. EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques. In Proceedings of the IEEE International Conference on Communications, Kuala Lumpur, Malaysia, 23–27 May 2016; pp. 1–6. [Google Scholar]
- Shi, D.; Ding, J.; Errapotu, S.M.; Yue, H.; Xu, W.; Zhou, X.; Pan, M. Deep Q-network-based route scheduling for TNC vehicles with passengers’ location differential privacy. IEEE Internet Things J. 2019, 6, 7681–7692. [Google Scholar] [CrossRef]
- Gao, H.; Qiu, B.; Barroso, R.J.D.; Hussain, W.; Xu, Y.; Wang, X. TSMAE: A novel anomaly detection approach for internet of things time series data using memory-augmented autoencoder. IEEE Trans. Netw. Sci. Eng. 2022. [Google Scholar] [CrossRef]
- Pudar, N.J.; Schwinke, S.P.; Tengler, S.C. Method of Using Vehicle Location Information with a Wireless Mobile Device. U.S. Patent 8,744,745, 8 June 2014. [Google Scholar]
- Gao, H.; Fang, D.; Xiao, J.; Hussain, W.; Kim, J.Y. CAMRL: A joint method of channel attention and multidimensional regression loss for 3D object detection in automated vehicles. IEEE Trans. Intell. Transp. Syst. 2022. [Google Scholar] [CrossRef]
- Zhou, L.; Yu, L.; Du, S.; Zhu, H.; Chen, C. Achieving differentially private location privacy in edge-assistant connected vehicles. IEEE Internet Things J. 2019, 6, 4472–4481. [Google Scholar] [CrossRef]
- Ren, W.; Tang, S. EGeoIndis: An effective and efficient location privacy protection framework in traffic density detection. Veh. Commun. 2020, 21, 100187. [Google Scholar] [CrossRef]
- Wu, L.; Wei, X.; Meng, L.; Zhao, S.; Wang, H. Privacy-preserving location-based traffic density monitoring. Connect. Sci. 2022, 34, 874–894. [Google Scholar] [CrossRef]
- Huang, Y.; Tian, Y.; Liu, Z.; Jin, X.; Liu, Y.; Zhao, S.; Tian, D. A traffic density estimation model based on crowdsourcing privacy protection. Acm Trans. Intell. Syst. Technol. 2020, 11, 1–18. [Google Scholar] [CrossRef]
- Kim, J.W.; Jang, B. Workload-aware indoor positioning data collection via local differential privacy. IEEE Commun. Lett. 2019, 23, 1352–1356. [Google Scholar] [CrossRef]
- Wang, J.; Wang, Y.; Zhao, G.; Zhao, Z. Location protection method for mobile crowd sensing based on local differential privacy preference. Peer-to-Peer Netw. Appl. 2019, 12, 1097–1109. [Google Scholar] [CrossRef]
- Yang, M.; Zhu, T.; Xiang, Y.; Zhou, W. Density-based location preservation for mobile crowdsensing with differential privacy. IEEE Access 2018, 6, 14779–14789. [Google Scholar] [CrossRef]
- Mirza, M.; Osindero, S. Conditional generative adversarial nets. arXiv 2014, arXiv:1411.1784. [Google Scholar]
- Seoul Metro Dataset. 2022. Available online: https://data.seoul.go.kr/dataList/OA-12252/S/1/datasetView.do (accessed on 30 June 2022).
Training data size | 1000 | 2000 | 4000 | 6000 | 8000 | 10,500 |
Training time (s) | 38 | 65 | 127 | 195 | 259 | 324 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kim, J.; Lim, B. Effective and Privacy-Preserving Estimation of the Density Distribution of LBS Users under Geo-Indistinguishability. Electronics 2023, 12, 917. https://doi.org/10.3390/electronics12040917
Kim J, Lim B. Effective and Privacy-Preserving Estimation of the Density Distribution of LBS Users under Geo-Indistinguishability. Electronics. 2023; 12(4):917. https://doi.org/10.3390/electronics12040917
Chicago/Turabian StyleKim, Jongwook, and Byungjin Lim. 2023. "Effective and Privacy-Preserving Estimation of the Density Distribution of LBS Users under Geo-Indistinguishability" Electronics 12, no. 4: 917. https://doi.org/10.3390/electronics12040917
APA StyleKim, J., & Lim, B. (2023). Effective and Privacy-Preserving Estimation of the Density Distribution of LBS Users under Geo-Indistinguishability. Electronics, 12(4), 917. https://doi.org/10.3390/electronics12040917